Let us assume canisters have credentials they need to use. The request from a client is sent to a boundary node. The boundary nodes could be malicious. So how can we avoid “man in the middle” attack at the boundary node? Can messages be encrypted or is it upto the canister developer to worry about this? Thanks in advance.
Related topics
Topic | Replies | Views | Activity | |
---|---|---|---|---|
If i hash something from the endpoint parameters, can the node providers see the original value? | 2 | 44 | January 12, 2025 | |
What are some do's and dont's when making canister calls from one canister to another? | 1 | 373 | November 14, 2021 | |
It is safe to keep secrets in a canister? | 7 | 798 | July 12, 2022 | |
Let's talk about boundary nodes as a high-risk point of failure for the IC | 19 | 1694 | September 5, 2023 | |
Can you simply secure private data? | 10 | 487 | March 25, 2024 |